 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
| n |
Hiding:
P \ A
|
|
|
n |
P
\A behaves as P except that all the actions in A
are
|
|
|
turned
into invisible actions. So they cannot be used
|
|
|
anymore
to synchronize with other processes.
|
|
|
n |
One possible use of this mechanism is to
avoid that
|
|
|
external
processes interfere with the communication
|
|
|
channels
in P. (Internalization of communication in P.)
|
|
|
| n |
Renaming:
P[y/x]
|
|
|
n |
P[x/y]
behaves as P except that all the occurrences of
|
|
|
x
are renamed by y.
|
|
|
n |
Typically
it serves to create different instances of the
|
|
same
process scheme
|
|
|
n |
Abbr: P[y1,y2
/x1,x2]
will stand for P[y1/x1][y2/x2]
|
|
|
|